Author:
Bajpai Prakersh,Misra Manoj Kumar,Mishra Prashant Kumar,Singh Shailendra
Publisher
Springer Nature Singapore
Reference20 articles.
1. Menezes J, Oorschot PCV, Vanstone SA (2001) Handbook of applied cryptography, 5th edn. CRC Press Inc., New York
2. Shukla V, Chaturvedi A, Misra MK (2021) On authentication schemes using polynomials over non commutative rings. Wireless Pers Commun 118(1):1–9. https://doi.org/10.1007/s11277-020-08008-4
3. Thakor VA, Razzaque MA, Khandaker MR (2021) Lightweight cryptography algorithms for resource constrained IoT devices: A review, comparison, and research opportunities. IEEE Access 9:28177–28193
4. Misra MK, Chaturvedi A, Tripathi SP, Shukla V (2019) A unique key sharing protocol among three users using non-commutative group for electronic health record system. J Discr Math Sci Cryptogr 22(8):1435–1451. https://doi.org/10.1080/09720529.2019.1692450
5. Hamouda BEHH (2020) Comparative study of different cryptographic algorithms. J Inf Secur 11(3):138–148